Trapdoor hash functions and their applications

From MaRDI portal
Publication:2304914

DOI10.1007/978-3-030-26954-8_1zbMath1436.94054OpenAlexW2950017470MaRDI QIDQ2304914

Tamer Mour, Yuval Ishai, Rafail Ostrovsky, Nico Döttling, Sanjam Garg, Giulio Malavolta

Publication date: 9 March 2020

Full work available at URL: https://doi.org/10.1007/978-3-030-26954-8_1




Related Items (39)

Large message homomorphic secret sharing from DCR and applicationsDoes Fiat-Shamir require a cryptographic hash function?Non-interactive batch arguments for NP from standard assumptionsSomewhere statistically binding commitment schemes with applicationsAsymptotically quasi-optimal cryptographySingle-server private information retrieval with sublinear amortized timeBatch-OT with optimal rateLeveraging linear decryption: rate-1 fully-homomorphic encryption and time-lock puzzlesCompressible FHE with applications to PIREfficient laconic cryptography from learning with errorsAlgebraic restriction codes and their applicationsBounded functional encryption for Turing machines: adaptive security from general assumptionsSublinear secure computation from new assumptionsCumulatively all-lossy-but-one trapdoor functions from standard assumptionsHow to build a trapdoor function from an encryption schemeStatistically sender-private OT from LPN and derandomizationRound-optimal black-box MPC in the plain modelA framework for statistically sender private OT with optimal rateNon-interactive zero-knowledge from non-interactive batch arguments\textsf{TreePIR}: sublinear-time and polylog-bandwidth private information retrieval from DDHCorrelation intractability and SNARGs from sub-exponential DDHA note on non-interactive zero-knowledge from CDHSimpler statistically sender private oblivious transfer from ideals of cyclotomic integersThe round complexity of quantum zero-knowledgeRate-1 quantum fully homomorphic encryptionSomewhere statistical soundness, post-quantum security, and SNARGsOn derandomizing Yao's weak-to-strong OWF constructionLaconic private set intersection and applicationsAmortizing rate-1 OT and applications to PIR and PSIMinicrypt primitives with algebraic structure and applicationsPrivate information retrieval with sublinear online timeSPARKs: succinct parallelizable arguments of knowledgeNew constructions of statistical NIZKs: dual-mode DV-NIZKs and moreWitness indistinguishability for any single-round argument with applications to access controlNon-interactive zero knowledge from sub-exponential DDHThe rise of Paillier: homomorphic secret sharing and public-key silent OTNew constructions of hinting PRGs, OWFs with encryption, and moreNIZK from LPN and trapdoor hash via correlation intractability for approximable relationsPassword protected secret sharing from lattices




This page was built for publication: Trapdoor hash functions and their applications